The Complexities Of Investigating Illegal Activity On The Dark Web

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In today’s world, given the situations that we have experienced both with the COVID-19 pandemic and the remote workforce— realities that will be with us for a long time to come—the need for Internet access has never been greater than it is now. Workers, along with everyday people, need access to many different websites, online portals, the company intranet—and yes, even Google—to conduct and execute daily job functions.

While the Internet is a gargantuan repository of information (in fact, there are some 1.7 billion websites currently available), this is actually an exceedingly small percentage of what’s out there. Yet another vast expanse of the Internet exists that many people have never heard of. This part of the Internet is known as the “Dark Web.”

While policing the Public Internet can be a relatively complicated task for law enforcement, this is compounded even more in the Dark Web, given the high level of complexity involved.

Explore some of the challenges law enforcement officials and even digital forensics investigators face when trying to collect evidence on the Dark Web, including:

  • Overcoming higher levels of encryption and anonymity
  • Difficulties in jurisdiction
  • Collecting evidence in different formats

Brought to you by

Should you download this content your information may be shared with the sponsors indicated above. Please see the privacy policy for Exterro here: https://www.exterro.com/privacy-policy. Please see Infosecurity Magazine’s privacy policy for more information.